Better client and server network level privacy (edited)

can i use NymVPN in mixnet mode to better hide my tor-hidden services?

request path:
HTTP Client = Tor Client → Tor Relay → Tor Relay
→ Tor Relay = Tor Rendezvous Point
→ Tor Relay → Tor Relay → Tor Relay
→ Nym Exit Node → Nym Relay → Nym Relay
→ Nym Client = Tor Client = HTTP Server

i guess no, because this would require port-forwarding (not implemented)

offering port-forwarding (and running exit-nodes in general) can cause legal trouble:

Law enforcement, however, often misunderstands how Tor works and has occasionally attributed illegal traffic on the network as originating from a Tor exit relay. This has resulted in police suspecting Tor relay operators of crimes and sometimes seizing computer equipment, including Tor relays.

probably better to wait for nym-hidden services

edit:

this would require port-forwarding

no. only tor relay nodes require port-forwarding
[tor-hidden services should run in a separate tor instance](https://tor.stackexchange.com/questions/3/what-are-the-implications-of-a-relay-hosting-a-hidden-service)

https://nym.com/blog/defeating-five-eyes-surveillance

Receiver anonymity means that the identity of the receiver is hidden, not only from communication outsiders but also from the sender, even if they are colluding. This is the property you want if you are running some sort of hidden service.